ringbot

Fail

Audited by Socket on Mar 1, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

This skill's stated purpose—making automated AI outbound phone calls—is inherently powerful and plausibly legitimate for tasks like scheduling or reminders. However, the documentation asks for high-value credentials (Twilio, LiveKit, Groq), allows an optional hosted provider (talkforceai.com) to mediate calls, and enables autonomous real-world actions (ordering, scheduling, mass calling). These factors create a meaningful risk surface: credential forwarding/harvesting, sensitive audio/transcript exfiltration, and misuse for spam/fraud. Malware is not evident from the README alone, but the combination of required secrets, third-party hosted routing, and lack of privacy/safety controls makes this skill medium-high risk for supply-chain and operational abuse. Recommend: do not provide production credentials without reviewing the code (agent.py, main.py) and deployment details; prefer scoped credentials, audit the hosted provider's privacy policy and retention, and require explicit per-call human approval and consent/recording notices before placing calls.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Mar 1, 2026, 01:40 AM
Package URL
pkg:socket/skills-sh/ypyt1%2Fall-skills%2Fringbot%2F@72fe9236edef235290a84797aee5547e98552f2c